-
1
Decentralized energy trading in smart grid using secured post quantum encryption
Published 2025-09-01Get full text
Article -
2
What Drives Digital Payment Adoption? Examining the Role of Ease of Use, Security, and Trust
Published 2025-02-01Get full text
Article -
3
-
4
Identification of the Employee's Mental Patterns about the Policies of Information Security
Published 2016-07-01“…Although most organizations use security technologies, they concluded that technology is not enough by itself and the key threat to the organization security comes from employees who do not agree with the organization security policies. …”
Get full text
Article -
5
Evaluating the Impact of Artificial Intelligence Tools on Enhancing Student Academic Performance: Efficacy Amidst Security and Privacy Concerns
Published 2025-05-01“…This research investigates the perceptions and attitudes of students towards the use of AI tools in their academic activities, focusing on constructs such as perceived usefulness, the perceived ease of use, security and privacy concerns, and both positive and negative attitudes towards AI. …”
Get full text
Article -
6
FEATURES OF USING FRAMEWORKS AND UX DESIGN APPROACHES FOR DEVELOPING ELECTRONIC INSURANCE PLATFORMS
Published 2024-09-01“…The right choice of frameworks and UX design approaches can significantly impact the quality of the final product, particularly its ease of use, security, and overall efficiency. Understanding these aspects allows developers to create more adaptable and successful solutions that meet user needs. …”
Get full text
Article -
7
Problems of implementing SIEM systems in the practice of managing information security of economic entities
Published 2020-03-01“…The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into the management of information security practices of economic entities [1-3].Materials and research methods. …”
Get full text
Article -
8
-
9
Adoption of digital payment systems in e-marketing: The moderating role of consumer trust in Jordan
Published 2025-07-01“…The study examines four essential variables: perceived ease of use, perceived usefulness, security and privacy, and awareness under the influence of consumer trust as a mediator. …”
Get full text
Article -
10
Security considerations for smartphone devices
Published 2024-12-01“…Last layer of the protection investigated was in-app information being leaked and otherwise used. Security objectives and mechanisms were also visited in the paper. …”
Get full text
Article -
11
A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption
Published 2025-01-01“…The system is combined with the 4×4 Toeplitz matrix to generate an encryption algorithm, validated using security and performance analysis. Combining the proposed system and the Toeplitz matrix improves the pixel distribution's randomness, significantly increasing security. …”
Get full text
Article -
12
Secure Coding in Five Steps
Published 2021-07-01“…Our evaluation shows that the approach reduces complexity and encourages students to use secure coding practice in their future projects.…”
Get full text
Article -
13
Foregrounding and exclusion strategies in Rouhani's election discourse (case study: 2017 presidential election)
Published 2021-08-01“…Consequently, in order to neutralize opponent's propaganda, Rouhani used security signifier in his discourse.…”
Get full text
Article -
14
Context-Aware Intelligent Traffic Light Control through Secure Messaging
Published 2018-01-01“…In this paper, we propose STCM, a context-aware secure traffic control model to manage competing traffic flows at a given intersection by using secure messages with real-time traffic information. …”
Get full text
Article -
15
A DLP Module Design Based on Plug-in for MS Word
Published 2020-08-01“…In order to solve this problem, it is important to introduce a DLP-Plugins model where the data owners can identify the privacy of the files during their entire lifecycle (creating, editing, etc.) by classifying them. This model uses security measures such as data encryption and access control to prevent accidental leakage of the classified files by the insiders. …”
Get full text
Article -
16
Developing real-time IoT-based public safety alert and emergency response systems
Published 2025-08-01“…Communication is facilitated using secure MQTT over TLS, with fallback to LoRa for rural or low-connectivity environments. …”
Get full text
Article -
17
Comparison of Mobile Transaction Security Using NFC and QR Codes
Published 2024-11-01“…These two payments have their characteristics. NFC payments use secure elements that encrypt credential data to ensure safe transactions. …”
Get full text
Article -
18
Mechanisms for Securing Autonomous Shipping Services and Machine Learning Algorithms for Misbehaviour Detection
Published 2024-10-01“…On one side, our solution is intended to secure communication channels between the SCCs and the vessels using Secure Exchange and COMmunication (SECOM) standard; on the other side, it aims to secure the underlying digital infrastructure in charge of data collection, storage and processing by relying on a set of machine learning (ML) algorithms for anomaly and intrusion detection. …”
Get full text
Article -
19
From Traditional Marketplace to Online Shop: Shifting Shopping Patterns among University Students in Bangladesh
Published 2025-06-01“…Besides, it is essential to instill customer trust in e-commerce platforms by using secure payment systems and trustworthy products and delivery services.…”
Get full text
Article -
20
Blockchain-enabled federated learning with edge analytics for secure and efficient electronic health records management
Published 2025-07-01“…The architecture comprises three layers: (1) an Edge Nodes Layer for on-device learning; (2) a Federated Aggregation Layer using Secure Multi-Party Computation (SMPC) and Differential Privacy (DP); and (3) a Blockchain Layer with a lightweight PoS + BFT consensus mechanism. …”
Get full text
Article